@scottalanmiller Why does it make a difference? Why can an SMB not interact socially the way that an MSP does with its vendors?
Posts made by GlennBarley
-
RE: Who to Connect with and How to Manage Multiple Networks on Social Media
-
RE: Who to Connect with and How to Manage Multiple Networks on Social Media
@scottalanmiller I would have to disagree with you. These technologies are becoming increasingly popular and used for a wide range of reasons. B2B Interactions is one of those reasons.
-
RE: Who to Connect with and How to Manage Multiple Networks on Social Media
@scottalanmiller The reason is to build a strong relationship with your clients and help increase the chances that they are going to stick with you as a service provider.
It may seem worthless, but giving clients the feeling that they have a back and forth with their provider is valuable, regardless of the platform.
We have plenty of examples of our partners either voicing a disappointment or a praise on social media and we actively respond to both.
-
RE: Who to Connect with and How to Manage Multiple Networks on Social Media
@scottalanmiller Why does it have to be a complaint? How about praise for a job well done? Or maybe it isn't the social account of the SMB, but the business owner's personal account.
Imagine the owner of that corner store sounding off on their own personal twitter account about a technical issue they are having and being able to find a quick and easy resolution via a reply.
It's about positioning yourself as a problem solver and building strong relationships.
-
RE: Who to Connect with and How to Manage Multiple Networks on Social Media
@scottalanmiller We talked about this at our user conference. I think the best example that I can give as to why this is important is from a Celtics game that I went to earlier this year. We were delayed getting in because of an issue with the security scanners and missed the opening tip off. I tweeted at the Celtics that I was frustrated and they immediately got back to me with a direct message offering me a seat upgrade. My frustration was immediately relieved and we watched the game from the floor.
This wouldn't have happened if they weren't monitoring their social media accounts.
-
RE: Some thoughts about Security
I'm not sure there is ever "too much security." The more secure your systems are, the better.
-
Who to Connect with and How to Manage Multiple Networks on Social Media
See the original blog at: MSP Blog
Social media can be a real driver for your business. If you've taken the time to set up your accounts, share content and make connections, you've probably experienced this firsthand. Still, managing all of these social networks can become a bit overwhelming if you're not connecting with the right people and keeping your contacts organized. The more you grow your network of connections, the more content and messaging will be made available to you. With this stream of new information, it can be easy to miss important posts. Luckily, you can continue to grow your following and influence without losing key content. In this post, I'll explain who to connect with and how to stay organized by segmenting contacts across the various social channels you're now active on.
Before you start to segment your contacts into groups or lists, start by first connecting with the right people.
Who Should You Connect With?
The answer to this question largely depends on what you're looking to get out of your social media efforts. In the meantime, here are a few categories of potential connections that you should explore:
Current Clients
You might be thinking, "Why would I need to connect with my clients? I already have their business!" This is true, but the key to retaining your current clients is to build strong relationships. Of course, new business is great, but you also want to make your current clients feel valued. Make new friends but keep the old! By connecting with your current clients on social media, you'll be able to see, in real time, what they're interested in and talking about. What if they're talking about you? Perhaps employees in their office can't connect to the Wi-Fi and are reaching out for assistance via Twitter. You can leverage your social presence to field these requests, troubleshoot the issues and deliver superior customer service. By following the client who's having trouble, you'll see this tweet in your feed. Instead of waiting for them to call you, proactively reply to their message and let them know that you're sorry for the service disruption, but are looking into it!Additionally, following clients expands your reach to their own individual networks. if you're having discussions with your current clients on social media, their connections are going to see these threads. Who knows, maybe the owner of one of the companies they are connected with will appreciate your accessibility and immediate response so much that they become a future client of yours!
Prospects
In our "Step-by-Step Guide to Targeting Your Verticals on Social Media," we discussed the importance of targeting the companies in your area that fit your buyer personas. Evaluate your current clients and determine which verticals you're serving. Additionally, identify which geographic areas you are servicing. Once you have broken your business down into verticals (it might be just one) and location, you should do an audit of all businesses that fit these two qualifiers. These are the companies that you should be connecting with. As you make connections, the content that you share will be made available to these potential clients. At the same time, you'll be able to see what they think is worth sharing and can learn of new trends and stories you may have otherwise missed. This way, you'll position yourself as a thought leader and problem solver in the industry, and your company name and logo will gain more visibility in your area.Relevant Publications & Thought Leaders
We've mentioned "sharing content" a couple of times in this post. Where is this content coming from? Hopefully, your company has a blog that you and your employees are consistently contributing to. However, blogs take time to create and maintain and sometimes, you just don't have that time. When this is the case, connect with and follow relevant publications, those that create the exact kind of content that will be interesting and helpful to your clients and prospects. This way, you'll see the content that these publications are sharing and can pass it along to your own connections.Even if you do have your own blog, it never hurts to connect with these publications and thought leaders. If you share one of their posts, they may reciprocate and share something that you have published. Now, you will increase your exposure and get in front of a larger collection of strategic accounts.
How to Stay Organized
Once you have built out a solid network of connections, you might notice that monitoring and managing social media can get a bit hectic. Messages from your prospects are mixed with your clients are mixed with the publications. If only there were a way to keep everything nice and organized...
There is! You can utilize social media lists or tags to segment contacts and connections. Some of you may choose to do this to separate personal and professional content. The methods vary a bit on each of the platforms, so let's take a brief look at how to stay organized on Twitter, Facebook and LinkedIn.
Keep reading! -
Kaseya Fake Invoice Malware Attack Underlines Need for Stricter Email Security
Original blog post at: MSP Blog
This weekend, news broke that malicious emails requesting payment for licenses were sent in remote management company, Kaseya's, name. This latest security headline is just one of many instances of malware launched through an email phishing scheme. The hackers, who haven't yet been identified, reportedly sent an email with a fake invoice attachment, which once opened, compromises the recipient's device with malware capable of stealing sensitive company data. If you've not yet heard of this latest hack sending tidal waves through the channel, let it serve as a warning. All employees and clients must screen any emails requesting payment for services, even those from a trusted name or company they do business with.
The Kaseya Email Attack Explained
On Saturday, January 16, Channelnomics reporter, Sam Trendall, exposed the false Kaseya email that landed in her inbox. According to her account, the email's subject is titled Kaseya Invoice with a random customer reference number to fake authenticity. Keeping up the rouse, the message is directed at the recipient company's Accounts Payable department, as shown in this screenshot provided by My Online Security:
The fake invoice with payment details is attached to the email in both a Microsoft Word document and Microsoft Excel XLS spreadsheet version. Once downloaded, malware such as Trojans, password stealers and ransomware infect the user's system.
It is worth noting that in each of these email impersonation attacks, the companies or individuals who've had their names used have not been hacked themselves. Unless their email servers have been compromised or some other vulnerability is exploited, they are not to blame for phishing attempts based on mimicry.
With that in mind, understand that hackers can make it look like any company is sending you a legitimate request, not just Kaseya. In case this latest attack signals a new trend in targeting companies in the IT services space, we advise you to be especially suspicious of invoice emails sent from any vendors within the channel, including those which may appear to come from Continuum.
If you do receive a phishing email like the one from Kaseya that's circulating, do not click into it or attempt to contact the sender. Along with other Microsoft Office tips like ensuring your programs are up-to-date, My Online Security reminds us that "if protected view mode is turned off and macros are enabled then opening this malicious document will infect you, and simply previewing it in Windows Explorer or your email client might well be enough to infect you." Besides disabling edit mode and macros to protect against this or future malware attempts, above all never open any attachment in an email you aren't expecting or aren't sure is legitimate. Pro tip: files ending in .exe, .com, .pif, .scr or .js should never be clicked or downloaded. These are indicators of malicious intent.
Thanks to social engineering, however, judging email legitimacy isn't always easy. Let's take a look at some of the tactics employed in the fake email above.
The attacker appears legitimate by addressing Accounts Payable rather than a random individual at the company. Knowing that this is the department that typically processes invoice payment, the scheme crafters hope to gain trust. Similarly, the Kaseya customer service department email address, [email protected] is believable, as the tail duplicates the company's name and the "cs" could be an abbreviation for customer service. A popular social engineering trick, attackers often manipulate account information to only subtly differ from the original. Additionally, pay attention to the email signature. By including one, the message seems to be sent from a professional account. Also, the email address listed matches the sender's address, which makes it easier for recipients to mistakenly trust.
As a sanity check, create a list of all your vendors, when they typically invoice you, which addresses the emails come from and the follow-up contact information detailed in the body of the email. Then, each new time you receive an email requesting payment, cross-reference it with this list to make sure it's legitimate.
For a closer examination of the process of email phishing, and common occurrences of it, check out this guest blog post about the current state of encrypting ransomware, written by our friends over at Webroot. What other best practices and tips can you share with your employees and clients to avoid additional malware cases? Check out our related material:
Protect Yourself and Clients from Malware
How to Keep Clients Safe from Phishing Attacks and Online Scams this Holiday SeasonAnd don't forget to stay up-to-date with the latest threats and patches! We compiled key updates from last month to give you an idea of what to look out for and help you stay ahead of the malware curve:
-
VIDEO: Flaw in Antivirus Program Allowed Hackers to Steal Passwords
Flaws in Trend Micro's antivirus program left user login names and passwords extremely vulnerable. Meanwhile, eBay has patched a security vulnerability that was leaving customer credentials exposed. To hear more, just click play!
Transcription
Hey everyone welcome back for another episode of IT Rewind. This week, a Google researcher discovered that flaws in Trend Micro’s antivirus product allowed for remote code execution by any website which left user passwords vulnerable. You’ll hear about this story and more right now on IT Rewind!
When you think of antivirus programs, you think of protecting your systems, right? Well, recently Tavis Ormandy, a well-known Google security researcher found that bugs in Trend Micro’s antivirus software was leaving users passwords extremely vulnerable. Since the discovery, Trend Micro has released an automatic update that fixes the issue. Still, in the emails that Ormandy exchanged with the security firm, it was clear that Trend Micro wasn’t moving fast enough to fix the issue. In one of the released emails, Ormany said quote, “…This means anyone on the internet can steal all of your passwords completely silently, as well as execute arbitrary code with zero user interaction. I really hope the gravity of this is clear to you, because I’m astonished about this.” End quote. The issue was in the password manager of the antivirus product, which was written in java script and opened up HTTP remote procedure call ports to handle API’s. Users could elect to export their passwords to it. Ormandy quickly found an API that allowed him to access passwords stored in the manager.
eBay has patched a vulnerability that could have exposed customer credentials. The cross-site scripting vulnerability left millions of users open to the threat of spear phishing attacks, which would have allowed cybercriminals to access credentials and potentially steal funds. The vulnerability involved the main domain and has been described as farily basic. The researcher who discovered the vulnerability was able to mirror eBay’s login page, which gave users an error when they tried to log in. However, it also revealed the username and password that the user attempted to enter. The researcher claims that eBay only fixed the issue after the media contacted them about it, even though he had brought it to their attention a month earlier.
Before we go I’m excited to announce that registration for Navigate 2016 is now officially open. Make sure to book your tickets to this years user conference right here in Boston, Mass! Head over to www.continuum.net/nav16 to register.
That’s all the time that we have for this week’s episode of IT Rewind, As always, read the full stories that we covered today and other tech stories by clicking on the links below.
Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum. We’re also on Facebook, LinkedIn, Spiceworks, YouTube and Periscope
Take it easy.
-
Grow Your Business - The MSP Sales Funnel [VIDEO]
Just about everyone involved in sales is familiar with the “funnel” in some form or another – but when looking at MSPs and IT service providers, what exactly are potential SMB customers thinking about at each stage of their journey towards becoming a customer? And what can we do as marketers to ensure prospects are receiving the right content and messaging at the right time?
In this episode of Grow Your Business, we take a quick look at the three main stages of the MSP sales funnel and explore the various types of marketing collateral and messaging that should be leveraged with each.
A full transcript of the episode is available below:
Episode Transcript:
Coming up on Grow Your Business, a look at the sales funnel for MSPs and IT service providers and how it correlates to your day to day marketing strategy.
Welcome to another edition of Grow Your Business, the show designed to provide MSPs and IT service providers with actionable marketing and sales insights you can use in your day to day business. Today we're going to take a look at the sales funnel. If you're involved in the sales process in any way at your practice, you may have seen these stages before, or you at a high level at least understand that prospects are moving through various stages and touchpoints on their way to becoming partners of yours. Today we're going to take a little bit more of a close look at each one of the three big stages in this funnel and really get a sense of where marketing can align with the sales process and what type of collateral and resources do you want to be using at each of these various stages.
Right up at the top of the funnel is our first touchpoint. At this point you have a business owner who's maybe identifying some sort of problem or challenge that they're having in their day to day lives. Maybe they want to make better use out of the technology they already have. Maybe they feel like they're spending too much money on an existing managed services provider, even a break fix provider who's taken a couple of days to come in and fix something when a machine goes offline or something like that. At some point or another there's going to be an issue identified. Someone's going to raise their hand and say, "Hey, you know, I could be doing better at this, we could be operating more efficiently or more effectively here, or we could be saving some cash flow here." There's going to be some issue identified.
The way that you're going to know that there's going to be an issue identified is really by looking at visits to your website and leads that are converting by filling out forms, by downloading an eBook, a white paper, subscribing to your blog, any of those content mediums that you have pushing out via the website. The type of materials and resources you want to be sharing at this point are high level and educational. From an MSP standpoint it could be the importance of patch management or how scripting can help save time or even the value of managed IT services for those customers that are still leveraging a break fix provider. It's not diving too deeply into your particular service offerings or your pricing or your business model. It's basically identifying and addressing a need and trying to help folks get a sense of hey, there may be a better solution out there.
After that they're going to be moving into this middle of the funnel or this second stage in the process. This is really where they're saying, "Okay, I've identified that there's some issue, something I can be doing a little bit better here. What are my options to actually improve that? How can I get out there and learn a little bit more? What providers, what services, and what support's available to help me do a little bit better?"
At this point you want to start pushing your products and services. You want to get a sense of, "Hey, these are the solutions that I actually have available. This is some of my pricing," if folks are interested enough at that point. "These are how we can help you solve the problem that you've identified and raised with us." Sales collateral, product data sheets, information that says, "This is actually how we do business, this is how our customers like to engage with us and how they work with us."
Once you provide a little bit of that information, they'll be interested and ready to really make a decision and get to that final step or the bottom of the funnel. At this point they've already identified a need. They want to get out there and partner with someone or find a solution to that problem. This last part is really about identifying why you're the right tool for the job or the right provider for the job, why your solutions are the best fit ones to solve this prospect's particular problems or pain points.
Here they're going to make a decision. They're ready to take action. They're ready to close the deal. They're ready to come on as a partner. At this point it's about looking at case studies, testimonials, social proof, things that are going to say, "Hey, we are as capable as we say we are in some of these pieces we are showing you earlier. We have customers that are happy and engaged. This is what they have to say about working with us." Things that are really going to help get folks across the finish line and basically sign that deal with you and come on board or at least get into an eval or a trial, raise their hand and say, "Hey, you seem like the right fit for me here, let's learn more, let's get started."
That was a very high level look at some of these three main basic stages of a funnel. What's unique and important for MSPs to remember and for service providers to remember is that in a lot of traditional lines of business, this is really the end of the line and this is where the transaction ends, but MSPs are really in the customer service business, the relationship business. There's often no shortage of opportunities to upsell, cross sell, have various touchpoints throughout the year, business reviews, compiling technology road maps and things like that. It's important to remember that even when you've reached this point with a particular customer, the process really comes right back up to the top and you can reset that clock and have an opportunity to constantly be in touch with folks and continue to upsell.
What's unique here and what's valuable here is that when you circle back up to the top of the funnel, you already know these folks. They're already doing business with you. You already have an understanding of what their business is like and who they are and what they need. It's a great way to continue this process and to continue building more revenue out of each of these customers.
That's a pretty quick look at the funnel here. Thanks again for watching. Be sure to check out our other episodes. We'll see you next time on Grow Your Business.
-
Coolest gadgets from the CES show?
So the CES show just wrapped up and there were some pretty cool new gadgets introduced to the world. We did a write up on "What MSPs Can Take Away from CES," but we want to see the new toys!
I think it's going to be hard to top the human-sized transportation drone... But what do you guys think were the coolest gadgets introduced?
Drop in links if possible! I want to see these things!
-
RE: Reasons for Managed Services in 2016
@scottalanmiller In house is very expensive, yes. What is your take on SMBs that seem stuck in the "break-fix" mindset?
-
Reasons for Managed Services in 2016
Original Source: MSP Blog
As cited in CompTIA's 4th Annual Trends in Managed Services report, "the global managed-services market is predicted to grow to $193B by 2019, at a Compound Annual Growth Rate (CAGR) of 12.5%." What is fueling this impressive level of adoption? Why are so many business owners fans of your business model? We dug into the report to examine the top reasons small-to-medium-sized businesses (SMBs) list for working with MSPs and IT solutions providers. As you build your 2016 sales strategy, pay attention to these main market drivers.Why SMB Owners Demand Managed Services
When thinking about how best to position your managed IT services, it's worth considering what points make for the most compelling sell. Remember that while you may think they should adopt your business model for one reason, they may have an entirely different set of priorities that you should appeal to first. So what should you lead with when marketing and selling to prospective clients? Using data presented in CompTIA's report as reference, we break it down for you! How well do you deliver - and communicate that you deliver - each of the following?
Let's break the top five down:
1. Increased efficiency/reliability of IT operations
As depicted in the chart above, 56 percent of companies with over a hundred employees list this as the main reason for working with a managed services provider (MSP). Indeed, it is the single most popular reason given. Often, the SMBs you aim to partner with have over-burdened IT staff with employees who may lack the skills and training for certain tasks or can't handle the whole of the company's network on their own. In response, these companies recognize the value of working with an outside technical support team. According to CompTIA's report, "60 percent of end users describe their managed services engagement as a collaborative arrangement with their internal IT department, suggesting that certain IT areas fall into the MSP bucket, while others remain in house." Notice how the reason provided is to improve the abilities of the in house team, not to do away with these IT employees altogether. Not only does it help having an extra team of IT experts able to troubleshoot and remediate issues that arise, clients benefit from having access to the latest technology and business-grade solutions that maintain uptime and profitability, such as remote monitoring and management (RMM), backup and disaster recovery (BDR) and cloud computing. Investing in these tools increases the reliability of organizations' IT infrastructure. Investing in the managed services business model tackles existing labor constraints and prevents internal IT departments from always having to play catch-up.2. Enhanced security/compliance
Laptops, desktops, smartphones, applications, tablets, servers, operating systems, browsers, wearable technology and the like all store and transmit data and thus require the strictest security measures. Prospective clients will turn to you out of fear of becoming the next headline in a high-profile data breach or data loss incident. Remind them of the most notorious examples highlighted in the media, and share the results and fallout. Use the information shared in our Top 10 Data Breaches of 2015 infographic to reach prospects who may share similar company profiles. Are you offering compliance as a service? If you're trying to convince a doctor's office to consider you, begin by stressing the importance of working with a HIPAA compliant IT solutions provider, one who understands HIPAA regulations and how to supplement them with additional managed security protocol, policies and procedures. Reference the Anthem data breach, which implicated one-third of Americans and compromised the medical data of nearly 100 million individuals. As CompTIA's study finds, security and data protection resonates with your target audience. Along these lines, compliance is becoming even more of an outsourced IT adoption driver for SMB owners, especially with regard to PCI security standards, since many businesses offer e-commerce on their websites.3. Proactive approach to maintenance
This is a benefit of managed IT services that we discuss a lot because it is so important. Your clients don't want to have to think about their daily IT operations. They don't want to have to second-guess the reliability and speediness of their network connection. Similarly, they don't want to have to worry about what the state their IT environment will be when they commute in to work each morning. They choose to work with an MSP because you can provide 24/7/365 coverage. Services like RMM and the security suite you offer detect potential disturbances and vulnerabilities, allowing you to resolve these problems before they develop into more critical threats. When you offer fully managed IT support, you can often troubleshoot and remediate glitches or bugs before the client is any the wiser. Again, they're paying you to worry about these things for them. Does a CEO have the time to verify that the backups his company has taken actually worked? We already know that data management in the cloud is expected to yield more managed services revenue in 2016. In working with the right MSP, key executives can take advantage of proactive BDR solutions that offer business continuity by combining RMM intelligence with regular, encrypted backups, cloud computing capabilities and IT virtualization.Click here to view the final two factors!
-
Do You Spend Too Much Time and Money Maintaining Your Managed IT Services Tools?
Article Originally Publish on: Continuum's MSP Blog
People use tools to make their jobs easier. A carpenter might use a SKILSAW to more easily complete a project, a director may take advantage of an Arri 35mm camera to shoot a movie and you might seek out remote monitoring and management (RMM) software to more easily monitor your clients' endpoints. When these tools work properly, you are able to complete projects much more effectively than you would be able to without them. But what happens when things go wrong?If the SKILSAW stops working, the carpenter needs to spend time and money repairing it. This is probably fine if it happens once or twice, but what if it's happening consistently throughout the course of the year? And what if the saw takes two weeks to repair every time it breaks? Soon, the gap between the time and money spent fixing the saw and the revenue earned building houses starts to grow smaller. In other words, the carpenter's margins are shrinking. The same ideology can be applied when MSPs use software-only solutions.
What's the Issue?
Okay, so software-only RMM software might not completely stop working the way that a power tool might, but it certainly could require a lengthy setup process, hands-on management, frequent updates, or even a full-time employee to make sure that things are always running smoothly. Over time, those costs start to add up. Like, way up.
Often times, MSP business owners look at the cost per agent when it comes time to select an RMM solution. Sure, this is important, but it certainly shouldn't be the only consideration. What are you getting for that cost? What is built in to the software that you're paying for? It's more important to think about the long term costs of the tools that you select. In the end, what will cost more? A few more bucks per agent for a fully-managed solution that you never have to worry about, or a full-time employee to oversee the software-only solution that you're paying less per agent for?
Shrinking margins are the real concern when it comes to software-only solutions. Even if you don't spend the money to hire a new employee, your existing technicians are going to be spending their time working on the tool instead of taking care of projects that they should be working on or investing time in relationships they should be building. On a per-day basis, the time spent updating or maintaining the tool may not seem like much, but add it all up at the end of the year. That little number looks a lot bigger now, doesn't it?
When considering an RMM solution, or any other MSP tool for that matter, there are a few questions that you should always ask yourself...
- How much time do you spend setting up this solution?
- How much time are you (or your techs) spending managing this software solution?
- How fast does it allow you and/or your technicians to work vs. another solution?
- What tasks are you and/or your technicians spending time on with this solution?
If the carpenter could have spent more money on a saw that had a built-in maintenance system that could automatically take care of any issues as they occurred, without him even knowing, don't you think he would?
What's the Solution?
Again, software-only solutions can be attractive because they are able to be purchased for lower prices. When you dig a bit deeper, you'll find that for a higher cost per agent, you're able to save yourself a LOT of money in the long run. Fully-managed solutions allow you to receive the same benefit that you would with a software-only solution, but you also get an entire team maintaining your system behind the scenes. The software needs an update? Don't lift a finger. It's taken care of for you.
Some of you business owners may have an issue with relinquishing complete management of the tools that you're using to monitor your clients. If this is the case, you can always step in. Fully-managed solutions allow you to have as much or as little involvement in the software as you'd like.
If you're currently using a software-only solution and don't agree with these points, simply start tracking these expenditures. Track how much time your employees are spending with the software. Come up with some sort of a tracking mechanism that will allow you to calculate the real cost of the solution that you have in place. You might end up realizing that it's worth it to spend a little more upfront on the saw that will save you money in the long haul.
-
Why MSPs Need to Vigilantly Monitor Endpoint Security in 2016
See the full blog at: Continuum's MSP Blog
With the Consumer Technology Association's CES 2016 conference kicking off today, I can't help but think of how many new gadgets, or endpoints, will be unveiled at the event by week's end. Endpoint management is becoming increasingly challenging due to the growing number of personal devices, as well as the growing number of places where a connected device can be found.
Not too long ago, I wrote a post on my own blog about IoT (Internet of Things). When taking a quick inventory, I was a little stunned to realize I actually carry six connected devices on my person each and every work day! Counting Bluetooth, Wi-Fi, and 3G/LTE devices, I have a laptop, smart pen, fitness watch, iPhone, iPad, Kindle and occasionally a USB stick. While these all bring enjoyment and productivity to my life, if not properly managed, they could also leave the security of my personal data and company's data seriously vulnerable. Considering how highly connected to the Internet we've become at home through TVs, thermostats or even Wi-Fi enabled refrigerators, it should make you and your clients wonder: how much of our data could we be potentially and unknowingly putting at risk?
Need-to-Know Statistics on Endpoint Security
Here is an excerpt of relevant findings from an independent endpoint security study done by the Ponemon Institute from 2015:
"Mobile devices, such as smart phones, have seen the greatest rise in potential IT security risk in the IT environment. Eighty percent of respondents say smart phones are a concern followed by vulnerabilities in third party applications (69 percent), mobile remote employees (42 percent) and the negligent insider risk. Governance and control processes are the biggest gaps in stopping attacks on endpoints. On average, 28 percent of attacks on an organization’s endpoints cannot be realistically stopped with enabling technologies, processes and in-house expertise. Seventy percent of respondents agree that their organizations’ endpoint security policies are difficult to enforce."
- Ponemon Institute Research 2015 State of the Endpoint Report: User-Centric Risk
Also, of the growing number of mobile attacks, a Webroot study found that 38.7 percent of attacks are SMS malware, 39.8 percent are Ad-SDK PUAs (potentially unwanted applications) and 8.9 percent are malware using obfuscation (malware hidden deep in an application's code).
- Webroot Mobile Threat Report 2014
How to Help Eliminate Anxieties about Endpoint Security
Thankfully, MSPs can reduce the data security risk described by setting and overseeing an AUP (Acceptable Use Policy). Start by applying an AUP that requires strong passwords on company issued laptops or company connected mobile devices. Clearly establishing what's expected of your employees when using a personal device for work and enforcing that protocol is critical, especially with the ongoing trend of BYOD (Bring Your Own Device)... Keep Reading!
-
RE: How Increased Data Mobility Can Strengthen Your 2016 MSP Business Plan
@scottalanmiller Awesome. Thanks for the advice and guidance!
-
How Increased Data Mobility Can Strengthen Your 2016 MSP Business Plan
Original post can be found at: Continuum's MSP Blog
People use (excuse me, depend on) anywhere between 2-3 devices on average, and the number is steadily increasing, expected to hit 4.3 by 2020. With the holidays behind us, I am sure many of you are finally getting comfortable with your new gadgets, but how comfortable are you with clients introducing these new toys into the office? Are you positive you can trust their use of personal devices in a professional setting?
More data mobility means there's a greater market need for managed IT security. Embrace this opportunity as you map out your 2016 business plan. By introducing new services and solutions you may not have ever thought to include in your product portfolio, you'll attract new clients and retain existing customers, all while growing your revenue and profitability!
The Need to Adapt in an Increasingly Mobile World
It is undeniable that technology has evolved at a rapid rate and simply having one connected device is old news. Your clients, like all users, turn to mobile devices – cell phones, laptops, tablets etc. – to pass time in waiting rooms, sift through social media updates and swiftly respond to important emails they’ve been anticipating. Consider this comScore graph which depicts the convergence (and dominance) of mobile with desktop usage:
Sure, the Internet of Things (IoT) and emergence of new endpoints makes it easy to stay connected on-the-go. There’s a caveat, however. An increasingly mobile world means more data, with more reliance on networks, connections and security.
In this case, managed services providers (MSPs) must adopt a broader product portfolio and skill set to keep up with the changing times. This point is emphasized by Ray Vrabel, Continuum's Senior Director of Strategic Planning, in our recent webinar, 2016 Business Plan, What Every MSP Should Be Offering Next Year. Joined by partner, Eric Wood of Blue Fox Group, the two reflect on what they believe every MSP should consider when kicking off 2016. Luckily, we are only a few days into the New Year. You still have plenty of time to explore new ideas, enter new lucrative markets and make this year your most successful one yet!
New Services and Products to Take a Hard Look at in 2016:
You know, and likely offer, the existing products and services that drive the managed IT services market - i.e. remote monitoring and management (RMM), backup and disaster recovery (BDR and business continuity, help desk client support and cloud computing.
But with the scope of IT infrastructure ever-expanding and the need for stricter data security, what new opportunities are out there that you've yet to explore? You could be leaving money on the table by not recognizing the value of being your clients' all-in-one IT solution. Expand your portfolio with:
Collaboration Tools
This is huge, since data is everywhere! People expect their cellphone, laptop, tablet and work desktops to work quickly, smoothly, and interchangeably. By providing collaboration tools with business-grade security, MSPs create offerings that are more competitive due to the increase of accessibility, communication and data protection between both employees and clients. With Bring Your Own Device (BYOD), compliance measures and corporate IP, file sync and share solutions are collaboration tools that are in especially high demand. Clients want their company data to be easily accessible, audited, fast, and most importantly, secure. As Ray reminds us in a previous blog post about new managed IT services to add, email is not the way you want clients transferring important and sensitive files. By introducing file sync and share as a new IT service, you can ensure their corporate data is encrypted, safe and separated from personal accounts.Security
What is the point of relying on the accessibility of modern technology if you have to constantly be reminded of potentially losing everything? With all of the coverage of recent data breaches pervading the mainstream media, your clients understand the importance of data security. As explained in the webinar, in an attempt to convince users to invest in their proactive IT solution, MSPs often lead with cybersecurity as a service. It's been known to really pay off too! Clients, particularly those bound to federal regulations, clearly understand the longterm business value of securing their data with a trusted solution. Recognizing this and adding security as an additional revenue stream, will only grow your profitability.Mobile Device Management (MDM)
The MDM market is burgeoning at an accelerated pace with multiple devices carried per person, both personally and professionally. With the ongoing and seemingly unstoppable trend of BYOD characterizing the modern workplace, the line between personal and corporate data has become blurred and managing all of this information, understandably complex. Complex, yet more necessary now than ever before. By adding Mobile Device Management (MDM) as a new service offering, MSPs have the ability to remotely wipe an individual’s data when he or she leaves the company or when a device is compromised.When looking for an MDM tool to offer clients, here are some features to look for:
- Synchronization and sharing between files
- Security for data
- Interchangeable support between personal and corporate devices
- Ability to maintain and manage the application
- Compliance as a Service
This is one of the most recent revenue streams that is providing huge margins. Since the switch from file cabinets to electronic medical records (EMRs), doctors and other healthcare providers have the ability to store and manage patient data seamlessly. Unfortunately, the data that lies within a doctor’s tablet, in addition to all of his or her employee’s devices, can add up to one giant HIPAA violation if necessary security precautions and protocol aren’t followed. Recalling the need for MDM, devices that are compromised are often referred to as $50,000 cellphones due to the hefty fines associated with HIPAA. HIPAA is just one form of compliance, however. PCI Security Standards apply to all organizations that store, process, or transmit cardholder data. Any clients that accept payment cards are required to be PCI compliant.
Your clients need help! This year's your chance to renew your commitment to being their trusted IT advisor and help them become and stay compliant. Continuum has partnered with RapidFire Tools to offer a PCI and HIPAA Assessment MSPs can then use with end-users. The modules are proving to sell themselves and offer extreme margins in the pre and post work projects generated.
What it Takes to be on Top this Year
In order to stay ahead of the competition and make the most out of 2016, MSPs must be a trusted advisor and an all-purpose IT provider by creating a one-stop-shop for their clients. By including additional services and products like the ones described here and others discussed in the webinar, MSPs will start out the year with a solid business plan, growing revenue and forming lasting customer relations with clients who'll appreciate this shared interest in helping them meet their own 2016 business goals.
-
RE: 12 Must-Know Cybersecurity Stats of 2015 [SLIDESHARE]
@scottalanmiller Thanks. I suppose we could embed the images, just seems a lot easier to post the link... But I understand that people may see it as "click bait," which we don't want to be perceived as posting. Will use this thread as a learning exprience and improve posting practices going forward. I looked as some of the other posts in "self promotion" and see how including the entire post in the thread can be done. Thanks!
-
Go-to questions to ask when interviewing a potential candidate
When multiple people from an organization are interviewing the same person, there can be a lot of repeat in questions. What are a few things that you like to ask when interviewing potential candidates for jobs, or what do you like to be asked while on an interview?